Access Logging Guardrails

Access Logging Guardrails

Overview

Access logging guardrails allow administrators to enable and store access logging information for cloud resources. Access logs are great to help understand the nature of requests to a particular resource, though it must be noted that they are often not guaranteed delivery. From a best practices security standpoint, it is almost always recommended to have access logging configured if there is an option to do so.

Guardrails Access Logging policies can be found directly under the service in the hierarchy:

Below is the list of allowed values for a generic Access Logging policy. This is not comprehensive as different resource types might have slightly different verbage:

    Skip
    Check: Disabled
    Check: Enabled
    Check: Enabled to Access Logging > Bucket
    Enforce: Disabled
    Enforce: Enabled to Access Logging > Bucket

The Access Logging guardrail has a number of policy sub-settings to determine what Guardrails is checking for. The format of these policy types is {Provider} > {service} > {resource} > Access Logging > {Items}. For example:

    {Provider} > {service} > {resource} > Access Logging > Bucket
    {Provider} > {service} > {resource} > Access Logging > Key Prefix

Policy Types Description

Policy Description
{Provider} > {service} > {resource} > Audit Logging Allows you to check or enforce access logging requirement for the resource.
{Provider} > {service} > {resource} > Audit Logging > Bucket The name of a S3 bucket to which the resource access logs is stored.
{Provider} > {service} > {resource} > Audit Logging > Key Prefix Define a folder (optional) inside S3 bucket to which the resource access logs is stored.

Notes:

Access Logging for Guardrails Managed Buckets

Guardrails provides policies to allow the automatic creation of logging buckets for use in services that require them. Guardrails logging bucket creation is managed by a stack, AWS > Turbot > Logging > Bucket, and is targeted at AWS regions. For more information, refer Stacks and Configured guardrail.

The Guardrails Access Logging guardrail has a number of policy sub-settings to determine the attributes of the access logging check. The format of these policy types is {Provider} > Turbot > Logging > Bucket > Access Logging > {Items}:

    {Provider} > Turbot > Logging > Bucket > Access Logging
    {Provider} > Turbot > Logging > Bucket > Access Logging > Bucket
    {Provider} > Turbot > Logging > Bucket > Access Logging > Key Prefix

Example family of policies:

Example policy values:

    # AWS > Turbot > Logging > Bucket > Access Logging
      - Disabled
      - Enabled
Policy Description
{Provider} > Turbot > Logging > Bucket > Access Logging Allows you to enable or disable access logging requirement for the services.
{Provider} > Turbot > Logging > Bucket > Access Logging > Bucket The name of a S3 bucket to which the services access logs is stored.
{Provider} > Turbot > Logging > Bucket > Access Logging > Key Prefix Define a folder(Optional) inside S3 bucket to which the services access logs is stored.

Note: